Use After Free Affecting libsepol package, versions <0:2.5-10.amzn2.0.1
Snyk CVSS
Attack Complexity
Low
Threat Intelligence
EPSS
0.1% (40th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-AMZN2-LIBSEPOL-6016266
- published 20 Oct 2023
- disclosed 1 Jul 2021
Introduced: 1 Jul 2021
CVE-2021-36084 Open this link in a new tabHow to fix?
Upgrade Amazon-Linux:2
libsepol
to version 0:2.5-10.amzn2.0.1 or higher.
This issue was patched in ALAS2-2023-2307
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream libsepol
package and not the libsepol
package as distributed by Amazon-Linux
.
See How to fix?
for Amazon-Linux:2
relevant fixed versions and status.
The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __cil_verify_classpermission and __cil_pre_verify_helper).
References
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
- https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
- https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/